Difference between revisions of "BeNeLux OWASP Day 2009 draft agenda"

From OWASP
Jump to: navigation, search
Line 2: Line 2:
 
  ! colspan="3" align="center" style=background:#BCA57A"; color:white" | '''College De Valck''' - December 2, 2009
 
  ! colspan="3" align="center" style=background:#BCA57A"; color:white" | '''College De Valck''' - December 2, 2009
 
  |-
 
  |-
  | style="width:15%; background:#7B8ABD" | 12:00 - 12:30 || colspan="2" style="width:75%; background:#C2C2C2" align="left" | Registration and sandwiches
+
  | style="width:15%; background:#7B8ABD" | 11:30 - 12:00 || colspan="2" style="width:75%; background:#C2C2C2" align="left" | Registration and sandwiches
 
  |-
 
  |-
  | style="width:15%; background:#7B8ABD" | 12:30 - 14:00 || colspan="2" style="width:75%; background:#F2F2F2" align="center" | OWASP Live CD - WebGoat workshop Part#1
+
  | style="width:15%; background:#7B8ABD" | 12:00 - 13:30 || colspan="2" style="width:75%; background:#F2F2F2" align="center" | OWASP Live CD - WebGoat workshop Part#1
 
'''Erwin Geirnaert & Martin Knobloch'''
 
'''Erwin Geirnaert & Martin Knobloch'''
 
  |-
 
  |-
| style="width:15%; background:#7B8ABD" | 14:00 - 14:15 || colspan="2" style="width:75%; background:#C2C2C2" align="left" | Break
+
| style="width:15%; background:#7B8ABD" | 13:30 - 13:45 || colspan="2" style="width:75%; background:#C2C2C2" align="left" | Break
 
  |-
 
  |-
  | style="width:15%; background:#7B8ABD" | 14:15 - 15:45 || colspan="2" style="width:75%; background:#F2F2F2" align="center" | OWASP Live CD - WebGoat workshop Part#2
+
  | style="width:15%; background:#7B8ABD" | 13:45 - 15:15 || colspan="2" style="width:75%; background:#F2F2F2" align="center" | OWASP Live CD - WebGoat workshop Part#2
 
'''Erwin Geirnaert & Martin Knobloch'''
 
'''Erwin Geirnaert & Martin Knobloch'''
 
  |-
 
  |-
| style="width:15%; background:#7B8ABD" | 15:45 - 16:00 || colspan="2" style="width:75%; background:#C2C2C2" align="left" | Break  
+
| style="width:15%; background:#7B8ABD" | 15:15 - 15:30 || colspan="2" style="width:75%; background:#C2C2C2" align="left" | Break  
 
|-
 
|-
  | style="width:15%; background:#7B8ABD" | 16:00 - 16:45 || colspan="2" style="width:75%; background:#F2F2F2" align="center" | [[BeNeLux09 - Secure development (for a secure planet).|Secure development (for a secure planet).]]
+
  | style="width:15%; background:#7B8ABD" | 15:30 - 16:10 || colspan="2" style="width:75%; background:#F2F2F2" align="center" | [[BeNeLux09 - Secure development (for a secure planet).|Secure development (for a secure planet).]]
 
'''Eoin Keary'''
 
'''Eoin Keary'''
 
  |-
 
  |-
  | style="width:15%; background:#7B8ABD" | 16:45 - 17:30 || colspan="2" style="width:75%; background:#F2F2F2" align="center" | [[WAF and Business Logic Attacks]]
+
  | style="width:15%; background:#7B8ABD" | 16:10 - 16:50 || colspan="2" style="width:75%; background:#F2F2F2" align="center" | [[WAF and Business Logic Attacks]]
 
'''Noa Bar-Yosef'''
 
'''Noa Bar-Yosef'''
 
  |-
 
  |-
| style="width:15%; background:#7B8ABD" | 17:30 - 17:45 || colspan="2" style="width:75%; background:#C2C2C2" align="left" | Break  
+
| style="width:15%; background:#7B8ABD" | 16:50 - 17:00 || colspan="2" style="width:75%; background:#C2C2C2" align="left" | Break  
 
|-
 
|-
  | style="width:15%; background:#7B8ABD" | 17:45 - 18:30 || colspan="2" style="width:75%; background:#F2F2F2" align="center" | [[SHA-3 Competition: The Quest for Long-Term Security in Cryptographic Hashing]]
+
  | style="width:15%; background:#7B8ABD" | 17:00 - 17:40 || colspan="2" style="width:75%; background:#F2F2F2" align="center" | [[SHA-3 Competition: The Quest for Long-Term Security in Cryptographic Hashing]]
 
'''Bart Preneel'''
 
'''Bart Preneel'''
 
  |-
 
  |-
  | style="width:15%; background:#7B8ABD" | 18:30 - 19:15 || colspan="2" style="width:75%; background:#F2F2F2" align="center" | [[Compliance driven vulnerabilities]]
+
  | style="width:15%; background:#7B8ABD" | 17:40 - 18:20 || colspan="2" style="width:75%; background:#F2F2F2" align="center" | [[Compliance driven vulnerabilities]]
 
'''Colin Watson'''
 
'''Colin Watson'''
 
  |-
 
  |-
| style="width:15%; background:#7B8ABD" | 19:15 - 19:45 || colspan="2" style="width:75%; background:#C2C2C2" align="left" | Dinner  
+
| style="width:15%; background:#7B8ABD" | 18:20 - 18:50 || colspan="2" style="width:75%; background:#C2C2C2" align="left" | Dinner  
 
|-
 
|-
  | style="width:15%; background:#7B8ABD" | 19:45 - 20:30 || colspan="2" style="width:75%; background:#F2F2F2" align="center" | [[BeNeLux09 - Web Application Firewalls: Detection, Bypassing and Exploitation|Web Application Firewalls: Detection, Bypassing and Exploitation]]
+
  | style="width:15%; background:#7B8ABD" | 18:50 - 19:30 || colspan="2" style="width:75%; background:#F2F2F2" align="center" | [[BeNeLux09 - Web Application Firewalls: Detection, Bypassing and Exploitation|Web Application Firewalls: Detection, Bypassing and Exploitation]]
 
'''Sandro Gauci'''
 
'''Sandro Gauci'''
 
  |-
 
  |-
| style="width:15%; background:#7B8ABD" | 20:30 - 21:15 || colspan="2" style="width:75%; background:#F2F2F2" align="center" | [[The OWASP Top 10 is dead, long live the OWASP Top 10 !]]
+
| style="width:15%; background:#7B8ABD" | 19:30 - 20:10 || colspan="2" style="width:75%; background:#F2F2F2" align="center" | [[The OWASP Top 10 is dead, long live the OWASP Top 10 !]]
 
'''Sebastien Deleersnyder'''
 
'''Sebastien Deleersnyder'''
 
  |-
 
  |-
| style="width:15%; background:#7B8ABD" | 21:15 - 21:30 || colspan="2" style="width:75%; background:#C2C2C2" align="left" | Break
+
| style="width:15%; background:#7B8ABD" | 20:10 - 20:20 || colspan="2" style="width:75%; background:#C2C2C2" align="left" | Break
 
  |-
 
  |-
| style="width:15%; background:#7B8ABD" | 21:30 - 22:15 || colspan="2" style="width:75%; background:#F2F2F2" align="center" | SDLC pannel
+
| style="width:15%; background:#7B8ABD" | 20:25 - 21:05 || colspan="2" style="width:75%; background:#F2F2F2" align="center" | Hybrid Analysis 2.0 - A demonstration of precision results correlation for improved software security testing
 +
'''Roger Thornton'''
 +
|-
 +
| style="width:15%; background:#7B8ABD" | 21:05 - 21:45 || colspan="2" style="width:75%; background:#F2F2F2" align="center" | SDLC pannel
 
'''Migchiel de Jong (Fortify)  Bart De Win (Ascure) Florence Mottay (Cigital) + tbd'''
 
'''Migchiel de Jong (Fortify)  Bart De Win (Ascure) Florence Mottay (Cigital) + tbd'''
 
|-
 
|-

Revision as of 15:03, 16 November 2009

College De Valck - December 2, 2009
11:30 - 12:00 Registration and sandwiches
12:00 - 13:30 OWASP Live CD - WebGoat workshop Part#1

Erwin Geirnaert & Martin Knobloch

13:30 - 13:45 Break
13:45 - 15:15 OWASP Live CD - WebGoat workshop Part#2

Erwin Geirnaert & Martin Knobloch

15:15 - 15:30 Break
15:30 - 16:10 Secure development (for a secure planet).

Eoin Keary

16:10 - 16:50 WAF and Business Logic Attacks

Noa Bar-Yosef

16:50 - 17:00 Break
17:00 - 17:40 SHA-3 Competition: The Quest for Long-Term Security in Cryptographic Hashing

Bart Preneel

17:40 - 18:20 Compliance driven vulnerabilities

Colin Watson

18:20 - 18:50 Dinner
18:50 - 19:30 Web Application Firewalls: Detection, Bypassing and Exploitation

Sandro Gauci

19:30 - 20:10 The OWASP Top 10 is dead, long live the OWASP Top 10 !

Sebastien Deleersnyder

20:10 - 20:20 Break
20:25 - 21:05 Hybrid Analysis 2.0 - A demonstration of precision results correlation for improved software security testing

Roger Thornton

21:05 - 21:45 SDLC pannel

Migchiel de Jong (Fortify) Bart De Win (Ascure) Florence Mottay (Cigital) + tbd